EFS: Enhanced FACES Protocol for Secure Routing In MANET
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 9
Abstract
Mobile Ad-hoc Network (MANET) is an autonomous system of mobile hosts equipped with wireless communication devices. These mobile nodes can form a network anywhere and at anytime. But the topology of the network thereby formed will be unpredictable due to frequent node movement. For sending data to destination, source node can send directly or can forward via an intermediate node depending upon the range of destination node. Since security is a major concern in ad-hoc network, secure routing algorithm is essential for MANET. Even if there are different algorithms to prevent selfishness in MANET and thereby to make routing in ad-hoc network secure, they have their own disadvantages. This paper explores the concept of a new algorithm which is an enhanced version of the existing FACES Algorithm that routes data on the basis of trust. The Trust is evaluated by conducting a Challenge scheme. This is an efficient scheme that can isolate malicious nodes and also it can make them trust worthy. This algorithm is also having several other significances. This paper will also make a study of the existing routing scheme FACES.
Authors and Affiliations
Geethu Bastian , Arun Soman
Refining the clustering of the k-mean clustering algorithm using of the Leaderfollower algorithm.
This paper is presented with the implementation of Leader-Follower clustering algorithm to improve the efficiency of clustering in k-means clustering algorithm. This Leader-follower algorithm, though unstable, can be imp...
Encryption/decryption tool with cryptanalysis
The dissertation titled” Encryption/Decryption Tool with Cryptanalysis” is based on the concept of cryptographic system. We have implemented a set of encryption/decryption methods which include Hill Cipher, Caesar Cipher...
SECURITY ALGORITHM IN CLOUD COMPUTING: OVERVIEW
Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typicall...
Vulnerabilities in Existing GSM Technology that causes Exploitation
Global System for Mobile communications (GSM system) has become the most popular standard for digital cellular communication for day to day communication in the world. Cellular phones have become a ubiquitous means of co...
Review Report on Semantic web service composition using Petri nets
Petri nets are graphical and mathematical modelling tool helpful for representation of semantic web service composition. Semantic web service composition explained by OWL-S language. OWL-S language supports control const...